Vulnerability Details : CVE-2016-1653
Potential exploit
The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc.
Vulnerability category: Denial of service
Products affected by CVE-2016-1653
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
- cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1653
2.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1653
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2016-1653
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1653
-
https://crbug.com/589792
589792 - Security: [v8] Out of bound(??) memory write with asm.js - chromium - Monorail
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
[security-announce] openSUSE-SU-2016:1061-1: important: Security update
-
https://codereview.chromium.org/1740123002
Issue 1740123002: [turbofan] Bailout if LoadBuffer typing assumption doesn't hold. - Code Review
-
https://security.gentoo.org/glsa/201605-02
Chromium: Multiple vulnerabilities (GLSA 201605-02) — Gentoo security
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
[security-announce] openSUSE-SU-2016:1135-1: important: Security update
-
http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
Chrome Releases: Stable Channel Update
-
http://www.debian.org/security/2016/dsa-3549
Debian -- Security Information -- DSA-3549-1 chromium-browser
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
[security-announce] openSUSE-SU-2016:1136-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
[security-announce] SUSE-SU-2016:1060-1: important: Security update for
-
http://www.ubuntu.com/usn/USN-2955-1
USN-2955-1: Oxide vulnerabilities | Ubuntu security notices
-
http://rhn.redhat.com/errata/RHSA-2016-0638.html
RHSA-2016:0638 - Security Advisory - Red Hat Customer Portal
Jump to